high match confidence
Sentence-level differences:
- Reworded sentence: "Linde relies on information technology systems and networks, including systems that utilize advanced technologies for business and operational activities, and also stores and processes sensitive business and proprietary information in these systems and networks."
- Reworded sentence: "Despite these steps, however, our information technology systems have in the past been and in the future will likely be subject to increasingly sophisticated cyber attacks and disruptions."
Current (2026):
Linde relies on information technology systems and networks, including systems that utilize advanced technologies for business and operational activities, and also stores and processes sensitive business and proprietary information in these systems and networks. These systems…
Read full text
Linde relies on information technology systems and networks, including systems that utilize advanced technologies for business and operational activities, and also stores and processes sensitive business and proprietary information in these systems and networks. These systems are susceptible to outages due to fire, flood, power loss, telecommunications failures, viruses, break-ins and similar events, or breaches of security. Linde has taken steps to address these risks and concerns by implementing advanced security technologies, internal controls, network and data center resiliency and recovery processes. Despite these steps, however, our information technology systems have in the past been and in the future will likely be subject to increasingly sophisticated cyber attacks and disruptions. Operational failures and breaches of security from such attempts could lead to the loss or disclosure of confidential information or personal data belonging to Linde or our employees and customers or suppliers. These failures and breaches could result in business interruption or malfunction and lead to legal or regulatory actions that could result in a material adverse impact on Linde’s operations, reputation and financial results. To date, such attempts have not had any significant impact on Linde's operations or financial results.
View prior text (2025)
Linde relies on information technology systems and networks for business and operational activities, and also stores and processes sensitive business and proprietary information in these systems and networks. These systems are susceptible to outages due to fire, flood, power loss, telecommunications failures, viruses, break-ins and similar events, or breaches of security. Linde has taken steps to address these risks and concerns by implementing advanced security technologies, internal controls, network and data center resiliency and recovery processes. Despite these steps, however, our information technology systems have in the past been and in the future will likely be subject to increasingly sophisticated cyber attacks. Operational failures and breaches of security from such attempts could lead to the loss or disclosure of confidential information or personal data belonging to Linde or our employees and customers or suppliers. These failures and breaches could result in business interruption or malfunction and lead to legal or regulatory actions that could result in a material adverse impact on Linde’s operations, reputation and financial results. To date, such attempts have not had any significant impact on Linde's operations or financial results.